Composing Security Protocols: From Confidentiality to Privacy.
Myrto ArapinisVincent ChevalStéphanie DelaunePublished in: POST (2015)
Keyphrases
- security properties
- security protocols
- security services
- security mechanisms
- automated design
- authentication protocol
- cryptographic algorithms
- security requirements
- cryptographic protocols
- security issues
- access control
- key management
- rfid tags
- data confidentiality
- artificial immune algorithm
- formal model
- data quality
- information security
- privacy preserving
- user privacy
- data streams